By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
What are TCP Wrappers? How do they work?
Controlling access to network services is one of the most important security tasks, and
s are what work out this access control by restricting services that can be used. TCP Wrapper is a daemon that is run instead of inetd. It intercepts requests and either allows inetd to run and service the request or does not run inetd, thereby denying the request. Using this method makes it possible to provide logging support, return messages to connections, permit a daemon to only accept internal connections, etc. TCP Wrapper can be used in conjunction with a firewall or other security enhancement, and it can serve nicely as an extra layer of protection for the system.
This Content Component encountered an error
To view network security expert Puneet Mehta's latest advice, see his Public Profile on the IT Knowledge Exchange: http://...continue reading
Find out if there's a difference between a virtual private network (VPN) concentrator and a network access server (NAS) in this explanation from our ...continue reading
Our network security expert explains how to keep unauthorized users from accessing your router's IP address for Internet access in this advice ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.